Results 21 to 30 of about 90,413 (378)
R-LWE-Based Distributed Key Generation and Threshold Decryption [PDF]
Ever since the appearance of quantum computers, prime factoring and discrete logarithm-based cryptography have been questioned, giving birth to the so-called post-quantum cryptography.
Ferran Alborch+2 more
doaj +3 more sources
A Mathematical Perspective on Post-Quantum Cryptography
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter+3 more
doaj +2 more sources
Resource guide for teaching post-quantum cryptography [PDF]
9 pages.
Joshua Holden
openalex +4 more sources
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability.
Tiago M Fernández-caramés+1 more
exaly +3 more sources
Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems.
Jongmin Ahn+7 more
doaj +2 more sources
Evaluation of Post-Quantum Distributed Ledger Cryptography [PDF]
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (**ECDSA**) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as Multi-Chain ...
Robert Campbell Sr.
doaj +3 more sources
Report on Post-Quantum Cryptography
In recent years, there has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum
Lidong Chen+6 more
semanticscholar +2 more sources
Post Quantum Cryptography and its Comparison with Classical Cryptography [PDF]
Cryptography plays a pivotal role in safeguarding sensitive information and facilitating secure communication. Classical cryptography relies on mathematical computations, whereas quantum cryptography operates on the principles of quantum mechanics, offering a new frontier in secure communication. Quantum cryptographic systems introduce novel dimensions
Tripathi, Tanmay+3 more
arxiv +3 more sources
Challenges and opportunities on the horizon of post-quantum cryptography [PDF]
Large quantum computers have the potential to break many cryptographic systems, e.g., Rivest–Shamir–Adleman, Diffie–Hellman key exchange, and the elliptical curve cryptosystem.
Bharat S. Rawal Kshatriya, Peter Curry
openalex +2 more sources
Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution [PDF]
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD).
Farshad Rahimi Ghashghaei+3 more
doaj +4 more sources